Analysis

  • max time kernel
    151s
  • max time network
    65s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    02/12/2022, 00:41

General

  • Target

    b02eaff832ff4363d2b94b317874ba3659c4ce2460a2462af9eadab08c40d10b.exe

  • Size

    220KB

  • MD5

    858cf30e0070f7d190feea948c7070a5

  • SHA1

    3fd9ef4b192ba88b91b459dfa84fbcfe71517d9c

  • SHA256

    b02eaff832ff4363d2b94b317874ba3659c4ce2460a2462af9eadab08c40d10b

  • SHA512

    c739233e4e63281c4f937f9230dcd35222e4601472c5094b839574a0c7addee1d34886f2acaf2b310cf56ef01b327d4980f7ff636139f6ea63d3cc45610c2fe7

  • SSDEEP

    3072:QgR1SrV8kY8YUL4qx9RIHgil3UuhSa3U3dD8d6Oy+MIrnj3JjNyr:91SZ8kx15x9SHVeOjf2

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 29 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b02eaff832ff4363d2b94b317874ba3659c4ce2460a2462af9eadab08c40d10b.exe
    "C:\Users\Admin\AppData\Local\Temp\b02eaff832ff4363d2b94b317874ba3659c4ce2460a2462af9eadab08c40d10b.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1832
    • C:\Users\Admin\xoeunex.exe
      "C:\Users\Admin\xoeunex.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:952

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\xoeunex.exe

    Filesize

    220KB

    MD5

    923931e8f9cd202b37ebc0a14e49ec5d

    SHA1

    8fc95af2167d92d47e217038f38c84871c5e6de5

    SHA256

    a0ba897879488e75d7f62d4a36fa2ef91e3324c5eddeba7bf2216aad22c42850

    SHA512

    16317e4487d1cbe9428670c0d9d35961a707a9bf31c5594233e7b5cf9d7a0a7762c2000bf7d68902efd2f32467c4a4ac474f590a5b9f668049e3e63475a70dc4

  • C:\Users\Admin\xoeunex.exe

    Filesize

    220KB

    MD5

    923931e8f9cd202b37ebc0a14e49ec5d

    SHA1

    8fc95af2167d92d47e217038f38c84871c5e6de5

    SHA256

    a0ba897879488e75d7f62d4a36fa2ef91e3324c5eddeba7bf2216aad22c42850

    SHA512

    16317e4487d1cbe9428670c0d9d35961a707a9bf31c5594233e7b5cf9d7a0a7762c2000bf7d68902efd2f32467c4a4ac474f590a5b9f668049e3e63475a70dc4

  • \Users\Admin\xoeunex.exe

    Filesize

    220KB

    MD5

    923931e8f9cd202b37ebc0a14e49ec5d

    SHA1

    8fc95af2167d92d47e217038f38c84871c5e6de5

    SHA256

    a0ba897879488e75d7f62d4a36fa2ef91e3324c5eddeba7bf2216aad22c42850

    SHA512

    16317e4487d1cbe9428670c0d9d35961a707a9bf31c5594233e7b5cf9d7a0a7762c2000bf7d68902efd2f32467c4a4ac474f590a5b9f668049e3e63475a70dc4

  • \Users\Admin\xoeunex.exe

    Filesize

    220KB

    MD5

    923931e8f9cd202b37ebc0a14e49ec5d

    SHA1

    8fc95af2167d92d47e217038f38c84871c5e6de5

    SHA256

    a0ba897879488e75d7f62d4a36fa2ef91e3324c5eddeba7bf2216aad22c42850

    SHA512

    16317e4487d1cbe9428670c0d9d35961a707a9bf31c5594233e7b5cf9d7a0a7762c2000bf7d68902efd2f32467c4a4ac474f590a5b9f668049e3e63475a70dc4

  • memory/1832-56-0x00000000751A1000-0x00000000751A3000-memory.dmp

    Filesize

    8KB